Transcription

1 Symantec EXAM - ST0-153 Symantec PGP Universal Server 3.2 Technical Assessment Buy Full Product Examskey Symantec ST0-153 exam demo product is here for you to test the quality of the product. This Symantec ST0-153 demo also ensures that we have this product ready unlike most companies, which arrange the product for you as you order These ST0-153 exam questions are prepared by Symantec subject matter specialists. Hence these are most accurate version of the ST0-153 exam questions that you can get in the market. We also offer bundle discount packages for every Symantec certification track, so you can buy all related exam questions in one convenient bundle. And for corporate clients we also offer bundles for Symantec certification exams at huge discount. Check out our ST0-153 Exam Page and Symantec Certification Page for more details of these bundle packages.

2 Question: 1. The Organization Certificate generates what type of certificates? A. X.509 Certificates for S/MIME B. SSL/TLS Certificates for browser-to-server connections C. PGP Keypairs for new users D. It generates PGP Keys and signs and resigns them every two weeks E. It can generate any of the above Question: 2. The proxy server option is not used in the class. Why would it be used? A. This is how the server is accessed from the browser. B. Licensing the server. C. This is how the server encrypts . D. Installing the server requires it Answer: B Question: 3. The WDE Disk Administrator Passphrase allows an administrator to & hellip; A. Log into the PGP Universal Server. B. Authenticate at BootGuard on any system in the Consumer Policy. C. Change a user WDRT from the server. D. Run a bypass on the user system even if it is powered down. Answer: B 2

3 Question: 4. To use a split ADK you must have the following: A. Enough keyshares to rejoin. B. Enough keyshares to rejoin plus the Organization Key. C. Enough keyshares to rejoin plus the user key that the data was encrypted to. D. Enough keyshares to rejoin plus the split key file. Question: 5. Alice is a CKM user who has just left the company. If the company was not using an ADK, how can they decrypt Alice's ? A. Using the Organization Key B. Using the Ignition Key C. By adding an ADK to PGP Universal Server D. It is not possible to decrypt Alice Question: 6. An Additional Decryption Key (or ADK): A. Is often split into shares for security. B. Can be used for decryption of files and s. C. Should only be used in situations clearly defined by an organization's security policies. D. All of the above 3

4 Question: 7. An admin could not cause the following problem by configuring mail policy incorrectly: A. Mail loops B. Mail sent in the clear that should be encrypted C. enrollment for PGP Desktop is not working D. is blocked by PGP Desktop Answer: C Question: 8. An administrator is trying to setup his PGP infrastructure using Directory Synchronization. Which of the following things is not handled by Directory Synch? A. Sorting External Users into policies B. Sorting Internal Users into policies C. Automatically harvesting X.509 certificates from non-pgp certificate servers D. Automatically moving users from one policy to another as values change in the directory Question: 9. Bob encrypts and signs a message using SMIME to a user cert that has been signed by a Public Certificate Authority. A. Alice is Trusting the CA signature B. This is an example of the SMIME Web of Trust C. This is manual verification D. This is not possible with PGP products 4

5 Question: 10. Bob uses a third-party backup application for PGP NetShare folders on his system. Which of the following is true? A. PGP NetShare will, by default, automatically back these files up encrypted. B. PGP NetShare ignores local files. C. The administrator can choose to prevent the automatic decryption of the data for the specified backup software package. D. None of the above. Answer: C Question: 11. By default, a PGP Universal Server running in Gateway placement: A. Is between the users and the mail server B. Has no mail proxies C. Is between the mail server and the Internet D. None of the above Answer: C Question: 12. By default, a PGP Universal Server running in Internal placement: A. Is between the users and the mail server B. Has only an Inbound SMTP proxy C. Is between the mail server and the Internet D. All of the above E. None of the above 5

6 Question: 13. By default, how often backups are done? A. Every other day B. Every day but Saturday and Sunday C. They are disabled D. Every day Question: 14. By default, PGP Universal Server backups: A. Occur automatically every day B. Do not occur automatically C. Are transferred to an FTP server (which must be specified during the PGP Universal Server setup assistant) D. Are only encrypted if you have configured PGP Universal Server to encrypt backups. Question: 15. Choose which statement is true given the following condition: If an ADK is imported into PGP Universal Server... A. The ADK is not used for encrypting B. All inbound mail from external domains will be encrypted to ADK C. Only internal PGP Desktop users will encrypt to the ADK D. All outbound from the managed domain(s) is encrypted to the ADK 6

7 7

8 THANKS FOR TRYING THE DEMO OF OUR PRODUCT Visit Our Site to Purchase the Full Set of Actual ST0-153 Exam Questions With Answers. We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Download Free Product Demo From: Money Back Guarantee Check Out Our Customer Testimonials 8

PGP Universal Server Administrator's Guide 3.2 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 3.2.0.

Page 1 of 5 Symantec Encryption Satellite for Windows Version 3.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release

Symantec Encryption Management Server Administrator's Guide 3.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Outlook Web Access End User Guide Page 0 Outlook Web Access is an online, limited version of an Outlook client which can be used to access an exchange account from a web browser, without having an Outlook

PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

Enterprise Vault.cloud Deployment Checklist This checklist is for administrators of the Symantec Enterprise Vault.cloud service. It summarizes the tasks required to deploy the service. Document version

Magento EXAM - M70-301 Magento Front End Developer Buy Full Product http://www.examskey.com/m70-301.html Examskey Magento M70-301 exam demo product is here for you to test the quality of the product. This

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well

PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,

What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

SSL Decryption Certificates Tech Note 0BOverview The Palo Alto Networks security gateway is capable of decrypting outbound SSL connections for the purpose of providing visibility and control of the traffic,

PGP Universal Satellite Version 2.7 for Windows Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Universal

Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and

SECURE Web Gateway HTTPS/SSL Technical FAQ Version 1.1 Date 04/10/12 Introduction This Technical FAQ explains the operation of the HTTPS/SSL scanning and how it is deployed. How does the SECURE Web Gateway

From Sales to Support All-in-one Stand Alone Solution Covering Customer Service, Call Tracking, HelpDesk, Knowledgebase and Built in Contacts Database and more.. Thank you for your interest in Resource

PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,